Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/101787?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/101787?format=api", "purl": "pkg:rpm/redhat/firefox@78.3.0-1?arch=el7_9", "type": "rpm", "namespace": "redhat", "name": "firefox", "version": "78.3.0-1", "qualifiers": { "arch": "el7_9" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63184?format=api", "vulnerability_id": "VCID-28dd-azvp-pkeu", "summary": "Using object or embed tags, it was possible to frame other websites, even if they disallowed framing using the X-Frame-Options header.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15648.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15648.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15648", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54721", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54722", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54701", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54741", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54615", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54686", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54708", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54677", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.5473", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54726", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54739", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15648" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872537", "reference_id": "1872537", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872537" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-28", "reference_id": "mfsa2020-28", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-28" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-29", "reference_id": "mfsa2020-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3555", "reference_id": "RHSA-2020:3555", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3555" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3557", "reference_id": "RHSA-2020:3557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3559", "reference_id": "RHSA-2020:3559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4080", "reference_id": "RHSA-2020:4080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4080" } ], "fixed_packages": [], "aliases": [ "CVE-2020-15648" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-28dd-azvp-pkeu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63140?format=api", "vulnerability_id": "VCID-6h7s-a74e-33c1", "summary": "Mozilla developer Anne van Kesteren discovered that <iframe sandbox> with the allow-popups flag could be bypassed when using noopener links. This could have led to security issues for websites relying on sandbox configurations that allowed popups and hosted arbitrary content.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15653.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15653.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15653", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51858", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51811", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51862", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51842", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51827", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51869", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51876", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51724", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51773", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51799", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51759", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51814", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15653" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861645", "reference_id": "1861645", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861645" }, { "reference_url": "https://security.archlinux.org/AVG-1213", "reference_id": "AVG-1213", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1213" }, { "reference_url": "https://security.archlinux.org/AVG-1214", "reference_id": "AVG-1214", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1214" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30", "reference_id": "mfsa2020-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32", "reference_id": "mfsa2020-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33", "reference_id": "mfsa2020-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3555", "reference_id": "RHSA-2020:3555", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3555" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3557", "reference_id": "RHSA-2020:3557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3559", "reference_id": "RHSA-2020:3559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4080", "reference_id": "RHSA-2020:4080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4080" }, { "reference_url": "https://usn.ubuntu.com/4443-1/", "reference_id": "USN-4443-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4443-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-15653" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6h7s-a74e-33c1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61663?format=api", "vulnerability_id": "VCID-75fd-w925-4qh4", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Mozilla Thunderbird, the worst of which could result in the arbitrary\n execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15676.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15676.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15676", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00808", "scoring_system": "epss", "scoring_elements": "0.74227", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00808", "scoring_system": "epss", "scoring_elements": "0.74236", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01265", "scoring_system": "epss", "scoring_elements": "0.7942", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01265", "scoring_system": "epss", "scoring_elements": "0.79403", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01265", "scoring_system": "epss", "scoring_elements": "0.79478", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01265", "scoring_system": "epss", "scoring_elements": "0.79462", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01265", "scoring_system": "epss", "scoring_elements": "0.79451", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01265", "scoring_system": "epss", "scoring_elements": "0.79481", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01265", "scoring_system": "epss", "scoring_elements": "0.7941", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01265", "scoring_system": "epss", "scoring_elements": "0.79433", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01265", "scoring_system": "epss", "scoring_elements": "0.79447", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01265", "scoring_system": "epss", "scoring_elements": "0.79456", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15676" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15676", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15676" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15677", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15677" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15678", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15678" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881665", "reference_id": "1881665", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881665" }, { "reference_url": "https://security.archlinux.org/ASA-202009-10", "reference_id": "ASA-202009-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202009-10" }, { "reference_url": "https://security.archlinux.org/AVG-1235", "reference_id": "AVG-1235", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1235" }, { "reference_url": "https://security.gentoo.org/glsa/202010-02", "reference_id": "GLSA-202010-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202010-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-42", "reference_id": "mfsa2020-42", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-42" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-43", "reference_id": "mfsa2020-43", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-43" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-44", "reference_id": "mfsa2020-44", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-44" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3832", "reference_id": "RHSA-2020:3832", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3832" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3833", "reference_id": "RHSA-2020:3833", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3833" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3834", "reference_id": "RHSA-2020:3834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3834" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3835", "reference_id": "RHSA-2020:3835", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3835" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4080", "reference_id": "RHSA-2020:4080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4155", "reference_id": "RHSA-2020:4155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4156", "reference_id": "RHSA-2020:4156", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4156" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4157", "reference_id": "RHSA-2020:4157", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4157" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4158", "reference_id": "RHSA-2020:4158", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4158" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4163", "reference_id": "RHSA-2020:4163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4163" }, { "reference_url": "https://usn.ubuntu.com/4546-1/", "reference_id": "USN-4546-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4546-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-15676" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-75fd-w925-4qh4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61662?format=api", "vulnerability_id": "VCID-8ztk-5sbf-6kez", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Mozilla Thunderbird, the worst of which could result in the arbitrary\n execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15673.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15673.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15673", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.7521", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75189", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75211", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75188", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75214", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.7522", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75133", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75136", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75166", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75143", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75177", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15676", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15676" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15677", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15677" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15678", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15678" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881667", "reference_id": "1881667", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881667" }, { "reference_url": "https://security.archlinux.org/ASA-202009-10", "reference_id": "ASA-202009-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202009-10" }, { "reference_url": "https://security.archlinux.org/AVG-1235", "reference_id": "AVG-1235", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1235" }, { "reference_url": "https://security.gentoo.org/glsa/202010-02", "reference_id": "GLSA-202010-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202010-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-42", "reference_id": "mfsa2020-42", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-42" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-43", "reference_id": "mfsa2020-43", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-43" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-44", "reference_id": "mfsa2020-44", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-44" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3832", "reference_id": "RHSA-2020:3832", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3832" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3833", "reference_id": "RHSA-2020:3833", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3833" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3834", "reference_id": "RHSA-2020:3834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3834" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3835", "reference_id": "RHSA-2020:3835", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3835" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4080", "reference_id": "RHSA-2020:4080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4155", "reference_id": "RHSA-2020:4155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4156", "reference_id": "RHSA-2020:4156", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4156" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4157", "reference_id": "RHSA-2020:4157", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4157" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4158", "reference_id": "RHSA-2020:4158", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4158" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4163", "reference_id": "RHSA-2020:4163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4163" }, { "reference_url": "https://usn.ubuntu.com/4546-1/", "reference_id": "USN-4546-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4546-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-15673" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8ztk-5sbf-6kez" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63144?format=api", "vulnerability_id": "VCID-9tc4-qr6d-6kfu", "summary": "When in an endless loop, a website specifying a custom cursor using CSS could make it look like the user is interacting with the user interface, when they are not. This could lead to a perceived broken state, especially when interactions with existing browser dialogs and warnings do not work.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15654.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15654.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15654", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65629", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65623", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65642", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65627", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65599", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65634", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65647", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65513", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65562", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65592", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65558", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65611", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15654" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861649", "reference_id": "1861649", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861649" }, { "reference_url": "https://security.archlinux.org/AVG-1213", "reference_id": "AVG-1213", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1213" }, { "reference_url": "https://security.archlinux.org/AVG-1214", "reference_id": "AVG-1214", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1214" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30", "reference_id": "mfsa2020-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32", "reference_id": "mfsa2020-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33", "reference_id": "mfsa2020-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3555", "reference_id": "RHSA-2020:3555", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3555" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3557", "reference_id": "RHSA-2020:3557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3559", "reference_id": "RHSA-2020:3559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4080", "reference_id": "RHSA-2020:4080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4080" }, { "reference_url": "https://usn.ubuntu.com/4443-1/", "reference_id": "USN-4443-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4443-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-15654" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9tc4-qr6d-6kfu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33651?format=api", "vulnerability_id": "VCID-g3mn-nhq4-zbhv", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12424.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12424.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12424", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36845", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.3692", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36903", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36841", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36998", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.37032", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36861", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36912", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36927", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36935", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36899", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36875", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12424" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872539", "reference_id": "1872539", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872539" }, { "reference_url": "https://security.gentoo.org/glsa/202007-10", "reference_id": "GLSA-202007-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-24", "reference_id": "mfsa2020-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-24" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-29", "reference_id": "mfsa2020-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3555", "reference_id": "RHSA-2020:3555", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3555" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3557", "reference_id": "RHSA-2020:3557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3559", "reference_id": "RHSA-2020:3559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4080", "reference_id": "RHSA-2020:4080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4080" }, { "reference_url": "https://usn.ubuntu.com/4408-1/", "reference_id": "USN-4408-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4408-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-12424" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g3mn-nhq4-zbhv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63141?format=api", "vulnerability_id": "VCID-h4r6-jrxh-6kcf", "summary": "JIT optimizations involving the Javascript arguments object could confuse later optimizations.\nThis risk was already mitigated by various precautions in the code, resulting in this bug rated at only moderate severity.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15656.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15656.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15656", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71929", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71908", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71932", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71915", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71898", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.7194", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71944", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71858", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71867", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71886", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71859", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00695", "scoring_system": "epss", "scoring_elements": "0.71897", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15656" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861646", "reference_id": "1861646", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861646" }, { "reference_url": "https://security.archlinux.org/AVG-1213", "reference_id": "AVG-1213", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1213" }, { "reference_url": "https://security.archlinux.org/AVG-1214", "reference_id": "AVG-1214", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1214" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30", "reference_id": "mfsa2020-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32", "reference_id": "mfsa2020-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33", "reference_id": "mfsa2020-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3555", "reference_id": "RHSA-2020:3555", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3555" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3557", "reference_id": "RHSA-2020:3557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3559", "reference_id": "RHSA-2020:3559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4080", "reference_id": "RHSA-2020:4080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4080" }, { "reference_url": "https://usn.ubuntu.com/4443-1/", "reference_id": "USN-4443-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4443-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-15656" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h4r6-jrxh-6kcf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33652?format=api", "vulnerability_id": "VCID-p6nb-kyzu-bbdf", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12425.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12425.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12425", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67562", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67571", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67584", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67459", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67495", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67516", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67494", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67545", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.6756", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67583", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67569", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00537", "scoring_system": "epss", "scoring_elements": "0.67535", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12425" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872540", "reference_id": "1872540", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872540" }, { "reference_url": "https://security.gentoo.org/glsa/202007-10", "reference_id": "GLSA-202007-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-24", "reference_id": "mfsa2020-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-24" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-29", "reference_id": "mfsa2020-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3555", "reference_id": "RHSA-2020:3555", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3555" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3557", "reference_id": "RHSA-2020:3557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3559", "reference_id": "RHSA-2020:3559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4080", "reference_id": "RHSA-2020:4080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4080" }, { "reference_url": "https://usn.ubuntu.com/4408-1/", "reference_id": "USN-4408-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4408-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-12425" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p6nb-kyzu-bbdf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61664?format=api", "vulnerability_id": "VCID-ps9s-3kuv-1yh1", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Mozilla Thunderbird, the worst of which could result in the arbitrary\n execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15677.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15677.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15677", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67091", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67108", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67094", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67063", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67096", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67111", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.6699", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67028", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67052", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67026", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67076", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67088", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15677" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15676", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15676" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15677", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15677" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15678", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15678" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881664", "reference_id": "1881664", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881664" }, { "reference_url": "https://security.archlinux.org/ASA-202009-10", "reference_id": "ASA-202009-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202009-10" }, { "reference_url": "https://security.archlinux.org/AVG-1235", "reference_id": "AVG-1235", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1235" }, { "reference_url": "https://security.gentoo.org/glsa/202010-02", "reference_id": "GLSA-202010-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202010-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-42", "reference_id": "mfsa2020-42", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-42" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-43", "reference_id": "mfsa2020-43", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-43" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-44", "reference_id": "mfsa2020-44", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-44" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3832", "reference_id": "RHSA-2020:3832", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3832" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3833", "reference_id": "RHSA-2020:3833", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3833" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3834", "reference_id": "RHSA-2020:3834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3834" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3835", "reference_id": "RHSA-2020:3835", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3835" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4080", "reference_id": "RHSA-2020:4080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4155", "reference_id": "RHSA-2020:4155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4156", "reference_id": "RHSA-2020:4156", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4156" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4157", "reference_id": "RHSA-2020:4157", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4157" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4158", "reference_id": "RHSA-2020:4158", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4158" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4163", "reference_id": "RHSA-2020:4163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4163" }, { "reference_url": "https://usn.ubuntu.com/4546-1/", "reference_id": "USN-4546-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4546-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-15677" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ps9s-3kuv-1yh1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63142?format=api", "vulnerability_id": "VCID-qhwf-9n5n-hbaa", "summary": "The code for downloading files did not properly take care of special characters,\nwhich led to an attacker being able to cut off the file ending at an earlier position, leading to a different file type being downloaded than shown in the dialog.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15658.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15658.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15658", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65629", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65623", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65642", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65627", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65599", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65634", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65647", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65513", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65562", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65592", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65558", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00491", "scoring_system": "epss", "scoring_elements": "0.65611", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15658" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861647", "reference_id": "1861647", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1861647" }, { "reference_url": "https://security.archlinux.org/AVG-1213", "reference_id": "AVG-1213", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1213" }, { "reference_url": "https://security.archlinux.org/AVG-1214", "reference_id": "AVG-1214", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1214" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30", "reference_id": "mfsa2020-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-30" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32", "reference_id": "mfsa2020-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33", "reference_id": "mfsa2020-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-33" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3555", "reference_id": "RHSA-2020:3555", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3555" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3557", "reference_id": "RHSA-2020:3557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3559", "reference_id": "RHSA-2020:3559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4080", "reference_id": "RHSA-2020:4080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4080" }, { "reference_url": "https://usn.ubuntu.com/4443-1/", "reference_id": "USN-4443-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4443-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-15658" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qhwf-9n5n-hbaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61665?format=api", "vulnerability_id": "VCID-w7rm-rw2c-wuas", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n Mozilla Thunderbird, the worst of which could result in the arbitrary\n execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15678.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15678.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15678", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.7521", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75189", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75211", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75188", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75214", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.7522", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75133", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75136", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75166", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75143", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75177", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15678" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15676", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15676" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15677", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15677" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15678", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15678" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881666", "reference_id": "1881666", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881666" }, { "reference_url": "https://security.archlinux.org/ASA-202009-10", "reference_id": "ASA-202009-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202009-10" }, { "reference_url": "https://security.archlinux.org/AVG-1235", "reference_id": "AVG-1235", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1235" }, { "reference_url": "https://security.gentoo.org/glsa/202010-02", "reference_id": "GLSA-202010-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202010-02" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-42", "reference_id": "mfsa2020-42", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-42" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-43", "reference_id": "mfsa2020-43", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-43" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-44", "reference_id": "mfsa2020-44", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-44" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3832", "reference_id": "RHSA-2020:3832", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3832" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3833", "reference_id": "RHSA-2020:3833", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3833" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3834", "reference_id": "RHSA-2020:3834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3834" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3835", "reference_id": "RHSA-2020:3835", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3835" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4080", "reference_id": "RHSA-2020:4080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4155", "reference_id": "RHSA-2020:4155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4156", "reference_id": "RHSA-2020:4156", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4156" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4157", "reference_id": "RHSA-2020:4157", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4157" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4158", "reference_id": "RHSA-2020:4158", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4158" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4163", "reference_id": "RHSA-2020:4163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4163" }, { "reference_url": "https://usn.ubuntu.com/4546-1/", "reference_id": "USN-4546-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4546-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-15678" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w7rm-rw2c-wuas" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33650?format=api", "vulnerability_id": "VCID-w9xm-y9fr-wyh7", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12422.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12422.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12422", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00616", "scoring_system": "epss", "scoring_elements": "0.69943", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00616", "scoring_system": "epss", "scoring_elements": "0.69951", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00616", "scoring_system": "epss", "scoring_elements": "0.69961", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00616", "scoring_system": "epss", "scoring_elements": "0.69845", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00616", "scoring_system": "epss", "scoring_elements": "0.69858", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00616", "scoring_system": "epss", "scoring_elements": "0.69873", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00616", "scoring_system": "epss", "scoring_elements": "0.6985", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00616", "scoring_system": "epss", "scoring_elements": "0.69898", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00616", "scoring_system": "epss", "scoring_elements": "0.69914", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00616", "scoring_system": "epss", "scoring_elements": "0.69938", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00616", "scoring_system": "epss", "scoring_elements": "0.69922", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00616", "scoring_system": "epss", "scoring_elements": "0.69908", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-12422" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872538", "reference_id": "1872538", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1872538" }, { "reference_url": "https://security.gentoo.org/glsa/202007-10", "reference_id": "GLSA-202007-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-10" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-24", "reference_id": "mfsa2020-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-24" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-29", "reference_id": "mfsa2020-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3555", "reference_id": "RHSA-2020:3555", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3555" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3557", "reference_id": "RHSA-2020:3557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3559", "reference_id": "RHSA-2020:3559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4080", "reference_id": "RHSA-2020:4080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4080" }, { "reference_url": "https://usn.ubuntu.com/4408-1/", "reference_id": "USN-4408-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4408-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2020-12422" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w9xm-y9fr-wyh7" } ], "fixing_vulnerabilities": [], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@78.3.0-1%3Farch=el7_9" }